Sciweavers

252 search results - page 8 / 51
» Experimenting with Server-Aided Signatures
Sort
View
SP
2007
IEEE
14 years 1 months ago
ShieldGen: Automatic Data Patch Generation for Unknown Vulnerabilities with Informed Probing
In this paper, we present ShieldGen, a system for automatically generating a data patch or a vulnerability signature for an unknown vulnerability, given a zero-day attack instance...
Weidong Cui, Marcus Peinado, Helen J. Wang, Michae...
ACSAC
2008
IEEE
14 years 2 months ago
Systematic Signature Engineering by Re-use of Snort Signatures
Most intrusion detection systems apply the misuse detection approach. Misuse detection compares recorded audit data with predefined patterns denoted as signatures. A signature is ...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...
ICDAR
2009
IEEE
14 years 2 months ago
Biometric Person Authentication Method Using Camera-Based Online Signature Acquisition
A camera-based online signature verification system is proposed in this paper. One web camera is used for data acquisition, and a sequential Monte Carlo method is used for tracki...
Daigo Muramatsu, Kumiko Yasuda, Takashi Matsumoto
ICPR
2008
IEEE
14 years 1 months ago
Signature verification based on fusion of on-line and off-line kernels
The problem of signature verification is considered within the bounds of the kernel-based methodology of pattern recognition, more specifically, SVM principle of machine learning....
Vadim Mottl, Mikhail Lange, Valentina Sulimova, Al...
BMCBI
2010
190views more  BMCBI 2010»
13 years 7 months ago
A parallel and incremental algorithm for efficient unique signature discovery on DNA databases
Background: DNA signatures are distinct short nucleotide sequences that provide valuable information that is used for various purposes, such as the design of Polymerase Chain Reac...
Hsiao Ping Lee, Tzu-Fang Sheu, Chuan Yi Tang